IAIK is one of the leading research institutions in cybersecurity.
We are proud of what we have achieved together.
IAIK
in a nutshell
The Institute of Applied Information Processing and Communications (aka IAIK) is the largest university institute in Austria for research and education in security and privacy. It is active in this field for more than 30 years and currently employs more than 60 researchers. The institute is part of the Faculty of Computer Science at Graz University of Technology.
Research
IAIK is one of the leading research institutions in cybersecurity and active in the following four areas: Cryptology & Privacy, Formal Methods, System Security, Secure Applications. Overall, the researchers of the institute have published more than 1000 scientific publications.
Among the sparkling highlights of IAIK’s research are the processor vulnerabilities known as “Meltdown” and “Spectre”. Cryptographers of the institute have contributed to major worldwide competitions in cryptography, like AES, SHA-3, and CAESAR; these contributions were always shortlisted or even won the competition.
Teaching
IAIK offers about 20 courses at the Bachelor and the Master level. In all courses, it is our goal to get students involved with the latest technologies and research challenges. This also holds for the Bachelor and Master thesis. As a consequence, several Bachelor and Master students are co-authors of publications at international top conferences each year.
Projects and Partners
The institute collaborates closely with research groups and industry partners around the globe. It is also very active in European and national research projects. The recently announced Cybersecurity Campus Graz creates a unique local environment for partnerships. This new hub for information security unites basic research, education, technology transfer, and industry partners all under one roof.
IAIK
Awards & Highlights
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.
Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi. Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat.
2019

Ascon - the primary choice for lightweight crypto
Ascon has been selected as the primary recommendation for lightweight authenticated encryption in the final portfolio of the CAESAR competition!
The CAESAR competition started in 2014 with the goal of identifying excellent authenticated encryption schemes for three use-cases:...